<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IPsec Failover in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625698#M1090677</link>
    <description>&lt;P&gt;Hi Sumy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please if the tunnel is up and working fine use the below command for failover.&lt;/P&gt;&lt;PRE&gt; crypto map outside_map 3 set peer 8.8.8.8 2.2.2.2&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;keep primary IP first then secondary ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&lt;/P&gt;</description>
    <pubDate>Mon, 06 Jun 2022 08:40:44 GMT</pubDate>
    <dc:creator>Jitendra Kumar</dc:creator>
    <dc:date>2022-06-06T08:40:44Z</dc:date>
    <item>
      <title>IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625692#M1090674</link>
      <description>&lt;P&gt;Hello community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have created a ipsec with two ASA both location having 2 ISP link. I have down NAT for both side.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what command need to put on both firewall that will activate failover. once primary ISP down them secondary.&lt;/P&gt;&lt;P&gt;should be up..&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sumy,&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 08:35:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625692#M1090674</guid>
      <dc:creator>sumy756</dc:creator>
      <dc:date>2022-06-06T08:35:06Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625697#M1090676</link>
      <description>&lt;P&gt;to check which firewall is active and which one is passive you give command on the ASA "Show failover" or "show failover | i host"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Failover will actiavte itself if you have put the interface monitoring on. you can check this "show monitor interface"&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Normally the interface come up as default when you configure the failover apart from sub-interface you have to bring it in as monitoring.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;"I have created a ipsec with two ASA both location having 2 ISP link. I have down NAT for both side."&lt;/P&gt;
&lt;P&gt;for this you need to configure ip sla for it to work.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118962-configure-asa-00.html" target="_self"&gt;Configure the ASA for Redundant or Backup ISP Links&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 08:43:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625697#M1090676</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-06-06T08:43:37Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625698#M1090677</link>
      <description>&lt;P&gt;Hi Sumy,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please if the tunnel is up and working fine use the below command for failover.&lt;/P&gt;&lt;PRE&gt; crypto map outside_map 3 set peer 8.8.8.8 2.2.2.2&amp;nbsp;&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;keep primary IP first then secondary ip.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Jitendra&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 08:40:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625698#M1090677</guid>
      <dc:creator>Jitendra Kumar</dc:creator>
      <dc:date>2022-06-06T08:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625701#M1090678</link>
      <description>&lt;P&gt;sorry i did not read the question properly,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;if you running ipsec on version IKEV2 in that case you need to be on ASA version 9.14. failover ipsec for ikev2 is support in version 9.14&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;here is the link for &lt;A href="https://integratingit.wordpress.com/2020/05/21/asa-multi-peer-vpn/" target="_self"&gt;ASA Multi-Peer IKEv2 VPN&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 08:49:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625701#M1090678</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2022-06-06T08:49:39Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625705#M1090679</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/287680"&gt;@Sheraz.Salim&lt;/a&gt;&amp;nbsp;for the reply. Having standalone ASA,s both sides. no failover.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 08:48:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625705#M1090679</guid>
      <dc:creator>sumy756</dc:creator>
      <dc:date>2022-06-06T08:48:58Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625709#M1090680</link>
      <description>&lt;P&gt;thanks, Cool Correct one... I have tested...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sumy,&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 08:51:18 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625709#M1090680</guid>
      <dc:creator>sumy756</dc:creator>
      <dc:date>2022-06-06T08:51:18Z</dc:date>
    </item>
    <item>
      <title>Re: IPsec Failover</title>
      <link>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625997#M1090709</link>
      <description>&lt;P&gt;this design is SubOptimal,&amp;nbsp;&lt;BR /&gt;ASA-1 use Secondary &amp;nbsp;but ASA-2 still use Primary&amp;nbsp;&lt;BR /&gt;the traffic will drop.&lt;BR /&gt;&lt;A href="https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/212478-configure-asa-virtual-tunnel-interfaces.html" target="_blank"&gt;https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-firewalls/212478-configure-asa-virtual-tunnel-interfaces.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;this best solution from Cisco.&lt;/P&gt;</description>
      <pubDate>Mon, 06 Jun 2022 14:42:13 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ipsec-failover/m-p/4625997#M1090709</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2022-06-06T14:42:13Z</dc:date>
    </item>
  </channel>
</rss>

